期刊文献+

无线传感器网络中一种可容错的安全聚集算法 被引量:3

Fault tolerant and security data aggregation algorithm in wireless sensor networks
下载PDF
导出
摘要 针对实际应用中无线传感器网络的隐私保护需求和无线通信易出错的特点,提出一种可容错的安全聚集算法。算法通过多路径聚集保证在链路出现故障的情况下聚集可以正常进行,使用轻量级的同态加密系统,对传感器节点读数进行端到端的加密,保护数据隐私的同时允许基站解密获得最终聚合结果。仿真实验表明,算法具备较高的安全性和较好的容错能力,在计算和通信开销增加很小的情况下,能够获得准确的聚集结果。 This paper proposed a security aggregation algorithm with fault tolerant for wireless sensor networks which have high rates of communication failures and need privacy protection in practical applica-tions. The algorithm uses multipath-based routing paths for reliably carrying out aggregation in sensor net-works exhibiting link failures, and uses a lightweight homomorphic cryptosystem for maintaining the end-to-end confidentiality of individual sensor readings, so the privacy-preserving can be achieved while allo-wing the sink node to decrypt the hidden aggregate value. Simulation results show that the algorithm a-chieves a high degree of security and fault tolerant, the accurate aggregate result can be obtained with im-posing small computation and communication overhead.
出处 《工业仪表与自动化装置》 2015年第3期6-9,共4页 Industrial Instrumentation & Automation
基金 江苏省宿迁学院重点科研基金项目(No.2012KY14) 江苏省宿迁市科技创新专项资金项目(Z201210)
关键词 无线传感器网络 容错性 隐私保护 数据聚集 wireless sensor networks fault tolerant privacy-preserving data aggregation
  • 相关文献

参考文献7

  • 1杨光,耿贵宁,都婧,刘照辉,韩鹤.物联网安全威胁与措施[J].清华大学学报(自然科学版),2011,51(10):1335-1340. 被引量:98
  • 2范永健,陈红,张晓莹.无线传感器网络数据隐私保护技术[J].计算机学报,2012,35(6):1131-1146. 被引量:64
  • 3He W, Liu X, Nguyen H, et al. PDA:Privacy- preser- ving data aggregation in wireless sensor networks [ C ]. Proceedings of the 26th IEEE International Conference on Computer Communications ( INFOCOM ). Anchorage: USA, 2007:2045 - 2053.
  • 4Alzaid H, Foo E, Nieto J G. Secure Data Aggregation in Wireless Sensor Network : A Survey [ C ]. Proceedings of the 6th Australasian Information Security Conference. Wollongong: Australia,2008:93 - 106.
  • 5He W, Nguyen H, Liu X, et al. iPDA: An integrity - protecting private data aggregation scheme for wireless sensor networcks [ C ]. Proceedings of the Military Com- munications Conference. SanDiego: CA, USA,2008 : 1 - 7.
  • 6Castelluccia C, Chan Aldar C -F, Mykletun E, et al. Efficient and provably secure aggregation of encrypted da- ta in wireless sensor networks [ J ]. ACM Transactions on Sensor Networks,2009,5 ( 3 ) : 1137 - 1153.
  • 7Gobriel S, Khattab S, Moss D, et al. Ridesharing: fault tolerant aggregation in sensor networks using corrective actions [ C ]. Proceedings of the 3rd Annual IEEE Com- munications Society on Sensor, Mesh and Ad hoe Com- munications and Networks ,2006:595 - 604.

二级参考文献30

  • 1Medaglia C M, Serbanati A. An overview of privacy and security issues in the Internet of things [C]// Proceedings of the 20th Tyrrhenian Workshop on Digital Communications. Sardinia, Italy: Springer, 2010:389-395.
  • 2Leusse P, Periorellis P, Dimitrakos T. Self managed security cell, a security model for the Internet of Things and services [C]// Proceedings of the 1st International Conference on Advances in Future Internet. Athens/Glyfada, Greece: IEEE, 2009: 47-52.
  • 3Hamad F, Smalov L, James A. Energy-aware security in M commerce and the Internet of Things[J].IETE Technical review, 2009, 26(5) : 357 - 362.
  • 4Juels A. RFID security and privacy: A research survey [J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2) :381 - 394.
  • 5Weber R H. Internet of Things New security and privacy challenges [J]. Computer Law & Security Reviezo, 2010, 26(1): 23-30.
  • 6CHEN Xiangqian, Makki K, Yen K, et al. Sensor network security: A survey [J]. IEEE communications Surveys Tutorials, 2009, 11(2) : 52 - 73.
  • 7Asrar I. Could sexy space be the birth of the sms botnet? [Z/OL]. (2010-10-16), http: //www. symantec, corn/connect/ blogs/could-sexy-space-be-birth-sms-botnet.
  • 8Karygiannis T, Eydt B, Barber B, et al. Guidance for securing radio frequency identification (RFID) systems [Z/OL]. (2010-10-16), http: //www. google, com. hk/url? sa = t&source- web&cd = 1&ved -- 0CCIQFjAA&url = http%3A%2F%2Fwww, rfidsecurityalliance, org%2Fdocs %2FDraft SP800-98%2520-%2520Guidance%2520for%2520 Securing%2520RFID. pdf&ret = j%q -- XSBlaN5D X 09Guidance% 20for% 20Securing%20Radio% 20Frequency %20Identification%20(RFID) %20Systems. &ei = vxhwTqbYLa 64iAfk2LCtCQ&usg = AFQjCNGoB6IJZ12KcFBUkWh_ 5PWGkOQSpg&cad- rjt.
  • 9Eschenauer L, Gligor V. A key management scheme for distributed sensor networks [C]// Proceedings of the 9th ACM Conference on Computer and Communications Security. New York, USA: Association for Computing Machinery, 2002, 41 - 47.
  • 10ZHANG Wensheng, Tran M. A random perturbation-based scheme for pairwise key establishment in sensor networks [C]// Proceedings of the 8th ACM International Symposium on Mobile ad Hoc Networking and Computing. New York, USA: Association for Computing Machinery, 2007: 90 - 99.

共引文献158

同被引文献23

  • 1Li D,Xu Y,IAu J,et 81. A market game for dynamic multi- band sharing in cognitive radio networks[C] Communications (ICC) ,2010 IEEE International Conference on IEEE,2010: 1-5.
  • 2Wang Y,Lin W,Huang Y,et al. Optimization of Cluster- Based Cooperative Spectrum Sensing Scheme in Cognitive Radio Networks with Soft Data Fusion[J]. Ieice Transactions on Communications, 2014,46(4 ):2871-2888.
  • 3Liu H,Zhou Y,Chu X,et al. Generalized-Bi-Connectivity for Fault Tolerant Cognitive Radio Networks [C]// Computer Communications and Networks (ICCCN),2012 21st Interna- tional Conference on IEEE,2012:1-8.
  • 4Louie R H Y, McKay M R, Chen Y. Multiple-antenna signal detection in cognitive radio networks with multiple primary user signals[C]//Communications (ICC) ,2014 IEEE Interna- tional Conference on IEEE,2014:4951-4956.
  • 5Han Z,Zheng R, Poor H V. Repeated auctions with Bayesian nonparametric learning for spectrum access in cognitive radio networks[J]. Wireless Communications,IEEE Transactions on IEEE, 2011,10(3 ):890-900.
  • 6Akkarajitsakul K, Hossain E,Niyato D. Distributed resource allocation in wireless networks under uncertainty and application of Bayesian game[J]. Communications Magazine, IEEE,2011,49(8):120-127.
  • 7Gao H,Cao J,Zhao Y. Membrane quantum particle swarm optimisation for cognitive radio spectrum allocation[J]. International Journal of Computer Applications in Techno- logy, 2012,43 (4):327-341.
  • 8Deshmukh V Y,Varade P S,Ravinder Y. Channel selection strategy for Cognitive Radio using NS2[C]//Human Computer Interactions (ICHCI),2013 International Conference on IEEE, 2013:1-5.
  • 9Pareek H,Singh A K. Fault Tolerant Spectrum Assignment in Cognitive Radio Networks[J]. Procedia Computer Science, 2015,46(5 ):1188-1195.
  • 10武志刚,苗长云,厉彦峰,郭翠娟.基于nRF905数传芯片的无线表决系统设计[J].天津工业大学学报,2008,27(2):58-60. 被引量:2

引证文献3

二级引证文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部